I am an Electrical Engineer by training, but a jack of all trades when it boils down to who I really am. I'm experienced in many technical areas and different aspects of the Defense and Intelligence Community. I'm trained to think fast, provide technical solutions, and never quit under stressful situations. The craft I have developed over the years, I owe to my very broad, but technical experience. I can think strategically and tactically. I've always had a knack for electronics; how they work and how can I modify them to do what I want them to do. The curiosity of what I could build as a kid never stopped, as it is what I do now. I've dabbled in many engineering disciplines. What I do now is the grown-up version of what I did as a child. I'm a field engineer. I'm a solutions driven individual.

Technical Operations Officer

Start Date: 2013-06-01

Performed open source and classified research on telecommunications infrastructure that required knowledge in radio frequency, cellular communication protocols, open source, and classified information databases. Trained in a myriad of capabilities used to conduct DoD Technical Operations in support of Defense Intelligence requirements. Proficient in various Tactics, Techniques, and Procedures (TTPs) for conducting TTL, Media and Cell Phone forensics and triage, Technical Surveillance, and concealment fabrication. Trained to operate with advanced multi-mode Surveillance Detection tradecraft. Working knowledge of various Linux distributions (Ubuntu, Deft, Tails, and Kali) for ad hoc secure note taking. Working knowledge of GSM, CDMA, and other cellular communication protocols for exploitation. Trained in bypass and entry techniques, vehicle survey, and biometric collection.

I am a broadly skilled All Sources Intelligence Analyst (35F) with proven expertise in driving intelligence requirements for protecting assets, civilian and military interests locally and overseas. Through contributing towards pro-active strategies, earned a reputation as someone who possess a thorough understanding of the intelligence process to compile, collate, analyze, produce, and evaluate all-source intelligence and provide subject matter expertise; Someone who is able to think clearly during times of complex operational activity, able to work in a team or autonomously, and is renowned for achieving excellence in results. I have over 8 years recent experience providing intelligence support and analysis to organizations directly supporting the war fighter. I have a strong operational background and experience in shaping intelligence products by fusing operations and intelligence information in order to support tactical or strategic goals set forth by the supported unit commander in order to create actionable target support packages. Due the complexity of my prior assignments, I have gained the skills to successfully apply a thorough understanding of ISR integration as well as the Ops/Intelligence fusion process to compile, collate, analyze and evaluate all sources of information associated with multiple events and their employment/facilitation by terrorist, insurgent, or criminal networks.I dominate following web-based intelligence tools, software, and databases: Multimedia Message Manager (M3), Tripwire Analytic Capability (TAC), NCTC Online, Terrorism Identities Datamart Environment (TIDE), ICReach SIGINT database, Distributed Common Ground System-Army (DCGS-A), Joint Automated Deep Operations Coordination System (JADOCS), Command Post of the Future (CPOF), Analyst Notebook /Palantir link analysis software, ArcGIS spatial analysis software, Google Earth spatial analysis software, and Microsoft productivity softwares.

Military Intelligence NCOIC & Instructor / Writer

Start Date: 2012-12-01

Instructor/Writer at the Western Hemisphere Institute for Security Cooperation, a multinational TRADOC school; provides specialized intelligence instruction, in Spanish, to officers, NCOs, law enforcement officers, and Civilian government personnel in support of the Strategic and Operational US SOUTHCOM Commander's objectives; responsible for health and welfare, coordination and execution of the Intelligence Analysis of Transnational Operations Course, and Intelligence Mobile Training Teams (MTTs) to prepare tactically proficient students for our allies' war on terror and illegal activities in the US SOUTHCOM Area of Focus (AOF)

Intelligence Sergeant

Start Date: 2010-10-01End Date: 2012-10-01

Served as the intelligence sergeant for a forward deployed Fires Brigade in support of the 2nd Infantry Division. During this time period, I led the 210th Fires Brigade S2 by providing advice in the planning, execution and supervision of the command's daily intelligence and security operations in Korea. During heightened tensions between North Korea and South Korea, produced over thirty intelligence products through analysis during the YP-Do incident that took place from 22 Nov to 23 Dec 2010 while serving as the TAC NCOIC and was recognized by the 210th Fires Brigade Commander by being awarded an impact award with the Army Commendation Medal for my actions. I established a solid Intelligence Oversight Program, Personel Security Program and Operations Security Program for the Brigade, receiving commendable on every CIP inspection for all the programs that I developed and managed. I trained over 50 MI Soldiers and 6 MI Officers in matters of DCGS-A, CPOF, JDOCS and GBS management across the 2nd INF DIV. In addition, I successfully orchestrated intelligence sharing between the ROK Army, GCC-CACC, and the 2ID; improving the effectiveness of the operations at the Brigade and higher levels through the Korean peninsula.

Brings over twenty years of experience in vulnerability evaluation and assessment, intelligence and network analysis, program management, operational and strategic planning, counternarcotics, counterterrorism, and homeland defense. A seasoned professional with a successful record for building, managing, and leading a multi-discipline team in joint operations and intelligence activities across the globe. He is a problem solver who can drive system architecture, integrate new technology, and outline software solutions in order to optimize business growth.

Director, Vulnerability Analysis Programs

Start Date: 2014-08-01

Focused on providing expertise in developing, executing and maintaining a vulnerability management processes as well as recommending protection methods, mitigation strategies and champion adoption of tools and techniques. As a part of his duties with Exostrategies he works with Honeywell Aerospace as the Senior Vulnerability Analyst on the Satellite Control Network Contract where he works closely with network operations analysts, incident response analysts, infrastructure engineers, information assurance engineers, and system administrators to ensure the networks security and health. He is responsible for leading the vulnerability adjudication process and conducts vulnerability analysis in the cyber security and physical security realm for both mission and non-mission environments.

Mr. Miranda has 12 years of consulting experience in the areas of Intelligence, Combating Weapons of Mass Destruction, Emergency Management, Threat Assessment, Public Policy Analysis, and Conference Management. More recently, Mr. Miranda worked as a Project Manager for the Global Initiative to Combat Nuclear Terrorism (GICNT) in the Bureau of International Security and Non-Proliferation. Mr. Miranda served as a liaison between the State Department and the Department of Homeland Security’s Domestic Nuclear Detection Office (DNDO) in developing both table top and full scale exercises for 3 of the 84 partner nations in combatting nuclear terrorism. Mr. Miranda has a wide range of knowledge in the area of countering Weapons of Mass Destruction and also some field work in Bio-Terrorism Table Top Exercises and Counter-Intelligence. Mr. Miranda also possesses 4 years of experience in supervising development, documentation, data mining, and in intelligence gathering. Currently, Mr. Miranda recieved his Instructor Certification from the Department of Homeland Security (DHS) for Basic Intelligence Training teaching Vulnerability and Threat Assessment, Critical Thinking Analytic Mindsets, and Principles of Intelligence Writing and Briefing.

I have over six years of experience working with the U.S. Government and USIC with a particular emphasis on financial intelligence and terrorism financing. Currently, I work as a Senior Specialist in Deloitte Advisory's Federal Practice supporting federal government customers on anti-money laundering projects. Previously, I was employed as an Enforcement Investigator for the Financial Crimes Enforcement Network (FinCEN) supporting the Enforcement Division. In this position, I was responsible for analysis and synthesizing intelligence data and raw BSA data.

Intelligence Analyst

Start Date: 2014-05-01End Date: 2014-09-01

- Supporting the Northern Virginia Regional Intelligence Center in counterterrorism and criminal intelligence, utilizing data from the law enforcement community, Department of Homeland Security, OGAs, as well as open source and proprietary databases

CounterintelligenceTech

Start Date: 2006-07-01End Date: 2007-07-01

• Managed and coordinated collections requirements for deployed personnel, liaised with government officials, and reviewed/validated critical mission-essential tasks for CI and HUMINT personnel. • Provided operational/technical support and intelligence oversight for offices in Iraq and Asia.

Senior Counterintelligence/HUMINT Specialist

Start Date: 2009-11-01End Date: 2011-01-01

I established a CI support team that supported five US bases in Kabul, AFG. I collaborated with source handlers, JCIU-A, JOB-A, and SOTF-10 at Camps Phoenix and Scorpion. I conducted joint interviews with JCIU-A and supported SOF elements with targeted CI screenings and credibility assessments, assisted the development of SOP and base access policy, and presented OPSEC briefs. I interviewed more than 200 Afghan nationals using Dari/Pashto/Urdu interpreters in targeted CI screenings. I evaluated persons-of-interest by using all-source analysis: AIMS/BI²R/BAT, CELLEX analysis, CI interview and PCASS exams, cross-agency checks, IMINT, M3 reporting, SIGINT, and SI reach-back. I routinely recommended removal/additions to the Biometrics Enabled Watch List (BEWL), edited BAT records, and produced POI dossiers. I produced target intelligence leads, oral/written briefings, link analysis products, CI threat assessments, and OPSEC assessments. I developed a CONUS-based target for US federal law enforcement, received written recognition from the JCIU-A Director, and contributed to three successful Army unit rotations.

Warrant Officer 1, Assistant OIC, Collection Management

Start Date: 2004-05-01End Date: 2005-04-01

As the Collection Management Assistant OIC and G2 Division Intelligence Battle Captain (2nd), I supervised and mentored nine intelligence analysts during the mobilization and deployment for OIF3, produced collection decks and developed NAI and TAI. I drafted a major portion of the Division’s intelligence collection plan and assisted DIV staff with assessing critical collection capabilities that successfully identified indicators and warnings. I planned, executed, and managed the Division’s first-ever use of MASINT (80 missions). I also assisted with the daily mission management of imagery collection for BCT support and secured the tasking of a wide spectrum of collection assets, up to national level. I provided constant intelligence liaison with sensitive U.S government agencies, CENTCOM, MNC-I-J2 and brigade elements.

CI/HUMINT Team Chief

Start Date: 2003-04-01End Date: 2004-04-01

I served as the acting Counter-intelligence/HUMINT section chief (an O-3 position) and was chosen by the Commander to attend a classified seminar in the U.K. as the CI/HUMINT team representative, supporting the unit’s pending mobilization for Bosnia. I mentored intelligence analysts on transiting from a Soviet-based OPFOR to the COE, as well as criminal intelligence analysis. I mentored junior CI agents on matters of force protection, OPSEC, insurgencies, case management, dossier development and threat vulnerability assessments. I completed MI-WOBC (All-source Tech) at Fort Huachuca, AZ during this time. I received written recognition for excellence in performance from Mr. David Hastings (CW5, MI, 351B/L).

Seized Asset Coordinator/Manger

Start Date: 1996-12-01End Date: 1998-05-01

I processed and managed seized-asset sharing from federal narcotics investigation. This required constant liaison and coordination with several federal and state agencies and routine execution of time-sensitive actions with senior staff members. I developed a standard operating procedure for managing this process, greatly improving it for which I received an official commendation (ARCOM).

Senior Intelligence Operations Specialist

Start Date: 2001-10-01End Date: 2002-06-01

Called to active duty in support of Operation Enduring Freedom. Assigned to the Deputy Chief of Staff (DCS) office for Intelligence, U.S. Army Japan as the Non-Commissioned Officer In-Charge of G2 Emergence Operations Center. Provided time-sensitive information on terrorists operating throughout the Southeast Asia region to the DCS and IC community. Daily briefed the threats and other critical force protection measures relating to hostile activities in Japan.

C2 NCOIC

Start Date: 1999-07-01End Date: 2002-11-01

Supervise and train personnel on researching and evaluating intelligence information and imagery using JWICS, SIPRNET, NIPRNET and open-source material. Gathered and briefed information on Asian countries posing a threat to national and international interests. Provide country studies and briefings on military capabilities in various Southeast Asian countries.

All Source Analyst/HUMINT Collector

Timestamp: 2015-12-26

Seven years of progressive experience in: All Source Analysis, HUMINT Collection and Analysis, Pattern of Life Analysis, Threat Assessment, Counter-IED (CIED) Analysis, Counter Terrorism and Counter Insurgencyofficials, and made contacts with fellow high school students from all over California.

HUMINT Collector (35M)

Start Date: 2006-06-01End Date: 2012-08-01

Responsibilities - Functioned as HUMINT intelligence team lead of military and DoD analysts and HUMINT collectors. Responsible for researching, developing, and presenting HUMINT products at the strategic level. - Supported HUMINT targeting operations in both Iraq and Afghanistan by providing all source analysis and fusion of raw multi intelligence. - Conducted over 1,000 interrogations of enemy prisoners of war in Iraq and Afghanistan. Produced over 400 intelligence information reports and drafted other HUMINT products to support the war fighter. - Conducted over 150 overt debriefings of third world refugees in support of US Army Southern Command. - SME/Observer-Controller at the INSCOM Detention Training Facility (IDTF) at Camp Bullis, TX certifying HUMINT collection teams to conduct HUMINT operations in Iraq and Afghanistan. Certified, trained, and mentored over 100 HUMINT collectors and All Source Analysts. Skills Used Interrogation, Debriefing, HOTR, M3, Query Tree, DCGS-A, CIDNE, Falcon View, TIGR, Microsoft Office

Senior Associate Consultant and Investigator

Start Date: 1993-01-01End Date: 1996-01-01

Responsibilities Service provider of comprehensive consulting, system design, training and investigations. Focused on Counterintelligence Service (TSCM) as the licensee for the firm. Value Example • Security Assessments: Directed and conducted more than 200 security risk assessments for a variety of facilities including: command/control structures, high-rise buildings, corporate offices, manufacturing/processing centers, line and service facilities, generating plants, etc. Provided clients actionable data to make informed decisions as to their security postures and solid business decisions regarding countermeasures to threats.

• Biosecurity and Bioterrorism: What Would A Prudent Person Do? Setting Standards of Ineluctable Prudence, Reasonable Forseeability, and an Affirmative Duty to Warn in Dual Use Biosecurity Governance Policy; Principle Investigator; Co-author Dr. Daniel Gerstein, Deputy Undersecretary, DHS S&T; Original study performed under supervision of Dr. Allison MacFarlane, Chairperson for Science and Security Committee of the Bulletin Of Atomic Scientists and current Chairperson for the Nuclear Regulatory Commission (NRC); Presented to National Academies of Science (NAS)/American Association Advancement of Science Conference

• Non Proliferation Analysis: What Would A Prudent Person Do? Setting Standards of Ineluctable Prudence, Reasonable Forseeability, and an Affirmative Duty to Warn in Dual Use Biosecurity Governance Policy

• Non Proliferation Analysis: Determining the practicability of enforcing self contained HEPA filter export restrictions for use in Cleanrooms or BSL containment facilities to further the Australia Group’s goal of preventing proliferation of dual use critical technologies

Introduction to Incident Command System (ICS) Certification Training is for persons involved with emergency planning, response or recovery efforts. The course provides the foundation for the history, features and principles, and organizational structure of the Incident Command System (ICS). It also explains the relationship between ICS and the National Incident Management System (NIMS).

Emergency Planning Certification This course is designed for emergency management personnel who are involved in developing an effective emergency planning system. This course offers training in the fundamentals of the emergency planning process, including design rationales, and develops capability for effective participation in the all-hazard emergency operations planning process.

Introduction to Continuity of Operations Certification This course provides specific training on the Continuity Management Cycle and how it should be used to develop sound continuity of operations plans. The course directly addresses continuity requirements for Federal Executive branch organizations including the legal basis for Continuity of Operations, structure of the continuity planning team, continuity program management cycles and utilizing the federal continuity planning model.

National Incident Management System (NIMS) Certification Course provides individuals with emergency management responsibilities including prevention, preparedness, response, recovery and mitigation training in key concepts and principles the NIMS Components including: Preparedness, Communications and Information Management, Resource Management, and Command and Management as well as the functional role of the National Integration Center.

NIMS Multiagency Coordination System Certification Course provides training for first responders and incident commanders from all emergency management disciplines in Multiagency Coordination (MAC). MAC Systems consist of a combination of elements: personnel, procedures, protocols, business practices, and communications integrated into a common system. Training also includes acquiring and allocating resources required by incident management personnel related to the entire MAC System and the identification of potential coordination and policy issues arising from an incident relative to the entire MAC System.

National Response Framework Certification The course provides training intended for government executives, emergency management practitioners, senior elected and appointed leaders, such as Federal department or agency heads, state governors, mayors, city or county officials who have a responsibility to provide for effective response. Content includes concepts and principles of the National Response Framework including response doctrine, governmental entity roles, responsibilities of and actions that support national response and multiagency coordination.

Idaho National Laboratories (INL) United States Computer Emergency Response Team (US-CERT) Control Systems Security Program (CSSP) Introduction to Control Systems Cybersecurity The purpose of this course is to provide instruction in the basics of industrial control systems security. This includes a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain. This course is split into four sessions: (1) Cybersecurity Landscape: Understanding the Risks, (2) Industrial Control Systems Applications, (3) Current State of Cybersecurity in Industrial Control Systems, and (4) Practical Applications of Cybersecurity.

INL US-CERT CSSP Intermediate Cybersecurity for Industrial Control Systems This course provides technical instruction on the protection of industrial control systems using offensive and defensive methods; provides understanding how industrial control system cyber-attacks could be launched, why they work, and mitigation strategies to increase the cybersecurity posture of their control systems

US-CERT Government Forum of Incident Response and Security Teams (GFIRST) Incident Response Training This course provides vulnerability assessment, systems administration, network monitoring, incident response, and digital forensics to create a comprehensive defense-in-depth experience with direct administrative access to a wide variety of networked systems (Windows, Linux and Cisco), which were modified and instrumented Additional defense-in-depth lecture/lab topics including Intrusion Detection Systems (IDS), network monitoring, and centralized log collection were presented. Hands-on exercises that further amplified the training included the introduction of additional network topologies requiring participants and teams to adapt and apply their skills to a new environment detect, analyze, and respond to real-world cyber-attack threat vectors.

Safeguards and Security SAS-101DE-Module1 General Technical Base Certification The General Technical Base Qualification Standard course for security personnel is intended to support security employees in the Technical Qualification Program by providing instruction on important concepts in the General Technical Base Qualification Standards. The audiences for this training are Federal security personnel who are responsible for the safe operation of defense nuclear facilities or who provide assistance, direction, guidance, oversight, or evaluation of contractor technical activities affecting the safe operation of defense nuclear facilities.

Safeguards and Security SAS-101DE-Module2 Safeguards and Security Program This course provides a detailed overview of the six S&S program elements--Program Planning and Management, Personnel Security, Physical Protection, Protective Force, Nuclear Material Control and Accountability, and Information Security—and the Security General Technical Base competencies.

Physical Protection Systems Overview PHY-100DE This course provides familiarity with the DOE physical protection systems. Lesson 1, Introduction to Physical Protection, includes the use of physical protection system (PPS) components and their integration into the design, planning, and evaluation of a PPS. Lesson 2, Physical Protection System Components (Sensors/Alarms), includes the main characteristics of intrusion sensors, alarms, and the protective force. Lesson 3, Physical Protection System Implementation (Access/Response), includes the relationship between intrusion-detection sensors, alarms, and the protective force. Lesson 4, Physical Protection System Validation (Analysis/Evaluation), includes the importance of evaluating the effectiveness of a PPS

Physical Security Systems Basic Survey Overview PHY-128DE This DOE Safeguards and Security (S&S) Program training is intended to provide a detailed overview of the DOE Oversight Model and survey, review, and self-assessment programs. Areas of coverage include Data Collection (Assessments and Methodologies), various assessment types, methodology of data collection, and performance testing for survey data collection; Survey activities that follow the data collection process are reviewed; Final Survey Report creation and information on the core functions of the Safeguards & Security Information Management System (SSIMS) are provided.

Introduction to Classified Matter Protection and Control (CMPC) ISC-121DE The course includes an overview of Information Security and the CMPC Program, as well as the following protection and control elements applied to classified matter: generation and marking; protection and storage; transmission; reproduction and destruction; and formal accountability. Also included is an introduction to unclassified controlled information (UCI)—specifically, Official Use Only (OUO) and Unclassified Controlled Nuclear Information (UCNI). The course incorporates knowledge checks and tests during all lessons to reinforce student learning and provides immediate feedback and remediation. The course also provides links to DOE and national directives, glossary terms, and document examples. A passing grade of 80% is required for course completion.

Classified Matter Protection and Control I ISC-221 Intermediate level course emphasizing development of skills needed to work within the Information Security and the CMPC Program, as well as the following protection and control elements applied to classified matter: generation and marking; protection and storage; transmission; reproduction and destruction; and formal accountability

Introduction to Nuclear Materials Control & Accountability MCA-101DE This course presents the properties and characteristics of nuclear materials that are important to safeguards; their categorization and attractiveness levels; current and historical diversity of nuclear materials in the DOE complex; the basic requirements for planning, implementing, and evaluating a nuclear materials control and accountability (NMC&A) program; the generation, collection, and utilization of nuclear materials accountability data; and the control mechanisms used in the detection and timely prevention of unauthorized activities in storing, processing, and transferring nuclear materials.

Operations Security (OPSEC) Overview ISC-141DE This course provides familiarity with the OPSEC concept, history and objectives of OPSEC, key program directives, and elements of the DOE OPSEC program. 2) OPSEC program implementation requirements. 3) The OPSEC analytical process.

Introduction to DOE Personnel Security PER-100DE This course provides a broad overview of the DOE Personnel Security Program. Topics include a program history; the roles and responsibilities of a personnel security program specialist/analyst; an introduction to applicable criteria and procedures as specified in Title 10, Code of Federal Regulations, Part 710 (10 CFR 710); and an overview of the DOE Administrative Review process

Human Reliability Program (HRP) Overview PER-110DE.and Module1 Human Reliability Program (HRP) Responsibilities PER-120DE These courses present a basic overview of the DOE Human Reliability Program (HRP). Topics include a summary of the HRP as applicable to candidates, incumbents, supervisors, HRP officials, and HRP medical professionals. Students will receive training in the overall DOE HRP program as it relates to Title 10, Code of Federal Regulations, Part 712 (10 CFR 712). Additionally, the course incorporates the role of Personnel Security and the medical assessment portion of the HRP, along with clarifying the process for testing, removals, and transfers within the program. The coursework also explains general HRP responsibilities, to include training, supervisor and non-medical responsibilities, temporary assignments, transfers, removals/return-to-work requirements, and the HRP reconsideration and certification review hearing process by the Office of Hearings and Appeals.

Physical Security Planning and Implementation […] The course provides an overview of the physical security planning and implementation process within the Department of Defense (DoD) physical security program and how the risk management model drives physical security planning and implementation. The course covers a number of areas related to facility design and physical security considerations for construction of new or modification of existing facilities, capped off by an interactive exercise in a virtual facility. Other areas covered in this course include exploring the documents that are used in physical security planning and implementation, The DoD Antiterrorism Program, and Oversight and Inspection processes.

Physical Security Measures […] The course defines the use and purpose of each measure. Topics covered include, but are not limited to, security in depth, intrusion detection systems, fencing, guard forces, and closed circuit television.

Security Policies, Principles and Programs […] The course provides an overview of the various policies, principles, programs, governing documents, as well as explores four overarching security disciplines that govern how the Department of Defense (DoD) implements its security programs.

Original Classification […] The course provides the policy guidance for and purpose of original classification. The course defines original classification, identifies Original Classification Authority requirements and qualifications; reviews the six steps of the original classification decision process; discusses original classification limitations and prohibitions; explains the basis for determining classification levels and duration; and lists the authorized means for providing classification guidance. Derivative Classification […] The course explains how to derivatively classify national security information from a classification management perspective. The course discusses the responsibilities associated with derivatively classifying information; describes the process and methods for derivatively classifying information; identifies authorized sources to use when derivatively classifying information and explains how to apply authorized sources, through derivatively classifying information based on the concepts of "contained in," "revealed by," and compilation.

Marking Classified Information […] The course provides the requirements and methods for marking classified information and other classified materials. Lessons address general marking requirements, marking originally classified information, derivatively classified information, changes in markings, marking special types and categories of materials and information.

Lock and Key Systems […] This course reviews various lock and key systems available for use in support of protecting classified and sensitive DOD information and assets. The course also identifies and discusses security considerations when choosing locks to secure many types of doors to buildings, ammunition bunkers, storage areas, offices, security containers, and filing cabinets.

Special Access Programs (SAP) Overview […] This course provides an overview of the DOD Special Access Program (SAP) environment, including its history, purpose, life-cycle, approval process, and roles and responsibilities.

Counterintelligence Awareness and Reporting Course for DOD Employees […] The training includes reviews of threats from Foreign Intelligence Entities (FIE), “modus operandi,” used by FIE, FIE use of the Internet and other communications such as social networking services. The course also reviews counterintelligence insider threats, recognizing anomalies, reporting responsibilities regarding foreign travel and foreign contacts to include foreign intelligence contacts, activities, indicators, and behaviors, international terrorism contacts, activities, indicators, and behaviors as well as FIE-associated cyberspace contacts, activities, indicators, and behaviors.

Operational Security Fundamentals (Interagency Support Staff and National Cryptologic School ) Provides basic working knowledge of OPSEC. Coursework focuses on history of OPSEC and the OPSEC process as described in NSDD-298. Includes scenario driven analysis to practice OPSEC indifferent operational environments.

Executive Director

Start Date: 2003-12-01End Date: 2007-04-01

Established groundbreaking non-profit educational initiative; cultivation of strategic partnering across cultural bridges locally, nationally • Development and project management of educational courses and materials, curricular benchmarks, workshops, seminars and mentoring programs • Supervised and trained administrative and volunteer team of 20+ individuals; • Promoted active and broad participation by volunteers in all areas of the organization's work. • Fundraising planning and implementation, including identifying resource requirements, researching establishing revenue strategies • Oversaw organization, its mission, programs, products and services are consistently presented in strong, positive image to relevant stakeholders • Responsible for the organizational leadership, including promoting and bridging intra-community diversity through engagement. • Served as the public representative for the organization both locally and nationally

Declassification Analyst

Start Date: 2014-07-01

Responsibilities • Applies Integrated Analysis of Naval equities in documents containing Unclassified through Top-Secret Restricted Data and Formerly Restricted Data, operating under the purvue and authority of the Atomic Energy Act of 1954 and Executive Order 13526 • Complete understanding of Classification Categories and Markings • Prioritizes and properly recognizes actual and possible nuclear weapons and intelligence information in any and all types of documents • Applies Analytical research to specific documents and weapon systems utilizing the Navy Rankin Computer System • Ensures Integrity of documents through proper security protocols while in possession and transit periods Accomplishments Analyze between […] documents per day. Intelligence editing.